Results 21 to 30 of about 1,020 (118)

SHA-1 and MD5 Cryptographic Hash Functions: Security Overview

open access: yesCommunications, 2015
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj   +1 more source

Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones [PDF]

open access: yes, 2016
We present the forensic analysis of the artifacts generated on Android smartphones by ChatSecure, a secure Instant Messaging application that provides strong encryption for transmitted and locally-stored data to ensure the privacy of its users. We show
Anglano, Cosimo   +2 more
core   +2 more sources

Establecimiento de claves seguro mediante códigos sonoros en dispositivos móviles [PDF]

open access: yes, 2017
El objetivo de este trabajo ha sido investigar el uso de canales sonoros para el intercambio de claves en teléfonos inteligentes. Para ello, se ha realizado un diseño y un análisis del problema a resolver, teniendo en cuenta factores como la necesidad de
Agudo-Ruiz, Isaac, Ruiz Tueros, Ricardo
core   +1 more source

Lightweight password hashing scheme for embedded systems [PDF]

open access: yes, 2015
Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized.
A Moradi   +5 more
core   +3 more sources

BootBandit: A macOS bootloader attack

open access: yesEngineering Reports, Volume 1, Issue 1, August 2019., 2019
Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a ...
Armen Boursalian, Mark Stamp
wiley   +1 more source

Construction of a New Biometric‐Based Key Derivation Function and Its Application

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Biometric data is user‐identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The fuzzy extractor is known as a prominent biometric cryptosystem.
Minhye Seo   +6 more
wiley   +1 more source

RiffleScrambler - a memory-hard password storing function

open access: yes, 2018
We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar
D Aldous   +6 more
core   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Self-Enforcing Access Control for Encrypted RDF [PDF]

open access: yes, 2017
The amount of raw data exchanged via web protocols is steadily increasing. Although the Linked Data infrastructure could potentially be used to selectively share RDF data with different individuals or organisations, the primary focus remains on the ...
A Lewko   +15 more
core   +1 more source

Adding security and privacy to genomic information representation [PDF]

open access: yes, 2019
Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are demanded. MPEG-G (ISO/IEC 23092,
Delgado Mercè, Jaime   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy